<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Client isolation on vSZ in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29104#M5625</link>
    <description>Yes there is a DHCP Server in place.&lt;BR /&gt;What do you mean with, not listed in the dhcp response?&lt;BR /&gt;The IP which i tried to ping was de domain controller in this network, and because its a guest wlan this access should not be able... as far i remember the IPs which i could ping was fix configured IPs, at least the Server was fix for shure.&lt;BR /&gt;&lt;BR /&gt;But i have to test again with focus on dynamic configured IPs next week.&lt;BR /&gt;It is the only way to block theese access with a L2 access List and block mac addresse from the Server?</description>
    <pubDate>Sat, 23 Jan 2016 16:58:33 GMT</pubDate>
    <dc:creator>adrian_kaegi</dc:creator>
    <dc:date>2016-01-23T16:58:33Z</dc:date>
    <item>
      <title>Client isolation on vSZ</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29102#M5623</link>
      <description>Hi&lt;BR /&gt;i configured client isolation on vSZ. Its working from Wifi client to wifi client. But i can reach hosts connected with ethernet cable in the same subnet.&lt;BR /&gt;ok... so i tryed to place a L2 Access list, to allow only traffic to Gateway, dhcp and broadcast. but it seems, that this ACL uses the MAC adresses as source MAC and not destination. ... so i have to add all wifi clients, and this is not possible...&lt;BR /&gt;Is there another way to place a L2 or L3 ACL? How can i setup a isolation with cabled hosts in the net?&lt;BR /&gt;&lt;BR /&gt;Thank you very much!&lt;BR /&gt;Adrian</description>
      <pubDate>Sat, 23 Jan 2016 15:20:09 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29102#M5623</guid>
      <dc:creator>adrian_kaegi</dc:creator>
      <dc:date>2016-01-23T15:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: Client isolation on vSZ</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29103#M5624</link>
      <description>When Client Isolation = Yes, it should result in WiFi clients not being able to communicate with each other but they should be able to communicate with the Default Gateway (which is learned via DHCP traffic).&lt;BR /&gt;&lt;BR /&gt;Do you have a DHCP server running on this SSID?&lt;BR /&gt;Are you trying to communicate with an IP which is not listed in the DHCP Response?</description>
      <pubDate>Sat, 23 Jan 2016 15:50:33 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29103#M5624</guid>
      <dc:creator>andrea_coppini</dc:creator>
      <dc:date>2016-01-23T15:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: Client isolation on vSZ</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29104#M5625</link>
      <description>Yes there is a DHCP Server in place.&lt;BR /&gt;What do you mean with, not listed in the dhcp response?&lt;BR /&gt;The IP which i tried to ping was de domain controller in this network, and because its a guest wlan this access should not be able... as far i remember the IPs which i could ping was fix configured IPs, at least the Server was fix for shure.&lt;BR /&gt;&lt;BR /&gt;But i have to test again with focus on dynamic configured IPs next week.&lt;BR /&gt;It is the only way to block theese access with a L2 access List and block mac addresse from the Server?</description>
      <pubDate>Sat, 23 Jan 2016 16:58:33 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29104#M5625</guid>
      <dc:creator>adrian_kaegi</dc:creator>
      <dc:date>2016-01-23T16:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: Client isolation on vSZ</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29105#M5626</link>
      <description>Take a look at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/answers/000005359" rel="nofollow" target="_blank" title="Link https//supportruckuswirelesscom/answers/000005359"&gt;https://support.ruckuswireless.com/answers/000005359&lt;/A&gt;&amp;nbsp;to understand how CI works.&lt;BR /&gt;&lt;BR /&gt;In simple terms, to make CI work correctly, you need to design your network to have nothing but a default gateway and&amp;nbsp;DHCP server on your guest VLAN.&amp;nbsp;</description>
      <pubDate>Sat, 23 Jan 2016 17:02:15 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29105#M5626</guid>
      <dc:creator>andrea_coppini</dc:creator>
      <dc:date>2016-01-23T17:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Client isolation on vSZ</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29106#M5627</link>
      <description>You could create an ACL on your network to prevent wireless cleints seeing your internal cabled network:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html" rel="nofollow" target="_blank" title="Link http//wwwciscocom/c/en/us/support/docs/security/ios-firewall/23602-confaccesslistshtml"&gt;http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Good luck</description>
      <pubDate>Sun, 24 Jan 2016 21:36:00 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-isolation-on-vSZ/m-p/29106#M5627</guid>
      <dc:creator>seanmuir</dc:creator>
      <dc:date>2016-01-24T21:36:00Z</dc:date>
    </item>
  </channel>
</rss>

